59 Matching Annotations
  1. Last 7 days
    1. How I block all online ads
      • The author describes a comprehensive setup to block virtually all online advertising across devices and services.
      • They focus on network-level filtering instead of per-device ad blockers, so that phones, TVs, and other clients benefit automatically.
      • The core of the solution is running a self-hosted DNS-based blocker (like Pi-hole or AdGuard Home) to sinkhole common ad and tracker domains.
      • Additional blocklists are layered on top to handle more aggressive tracking and region-specific ad domains, trading a bit of breakage for increased privacy.
      • For services that hardcode ad endpoints or use techniques that bypass DNS blocking, the author uses more advanced tools such as proxying or firewall rules.
      • Some apps and sites break when ads are blocked; in those cases, the author selectively whitelists domains or uses per-device exceptions rather than relaxing global rules.
      • On mobile, encrypted DNS and VPN-like tunneling are configured so that all traffic still flows through the home-level blocking setup even on the go.
      • The author argues that this configuration significantly improves page load times, reduces bandwidth usage, and makes devices feel faster and less cluttered.
      • They acknowledge an ethical gray area with ad blocking but conclude that user safety, privacy, and mental comfort outweigh the downsides of depriving low-quality ad networks of revenue.
      • The piece emphasizes that the goal is not absolute perfection but a sustainable setup that requires minimal maintenance once deployed.

      Hacker News Discussion

      • Commenters discuss additional tools like SponsorBlock for skipping in-video sponsorships on platforms such as YouTube, highlighting that traditional ad blockers do not remove creator-embedded promos.
      • Several users point out that DNS-level blocking does not stop ads injected directly by streaming services, noting that such platforms often use certificate pinning or app-level tricks that make proxying and MITM approaches difficult or impossible.
      • A highly upvoted comment recommends using a user-agent switcher to bypass sites that block non-Chrome browsers, with examples where services claim to be incompatible with Firefox but run better once the browser “pretends” to be Chrome.
      • Participants criticize websites that enforce brittle user-agent checks instead of feature detection, arguing that this needlessly breaks otherwise compatible browsers and punishes privacy-conscious users.
      • Some users express skepticism about privacy-focused browsers that are built on or dependent on codebases controlled by ad-driven companies, calling out an inherent tension between privacy promises and ad-based business models.
  2. Dec 2023
    1. What does it mean when something is non-blocking?

      "Non-blocking" means a program will allow other threads to continue running while it's waiting. This is opposed to "blocking" code, which stops execution of your program completely. Normal, synchronous I/O operations suffer from this limitation.

  3. Sep 2023
    1. Difference between time blocking and timeboxing Time blocking and timeboxing both involve allocating fixed time periods to activities - but, while time blocking includes strictly reserving time for an activity, timeboxing includes limiting the time you spend on it. Time blocking

      مسدود کردن زمان و جعبه زمانی هر دو شامل تخصیص دوره‌های زمانی ثابت به فعالیت‌ها می‌شوند - اما، در حالی که مسدود کردن زمان شامل رزرو دقیق زمان برای یک فعالیت است، جعبه زمانی شامل محدود کردن زمانی است که برای آن صرف می‌کنید.

  4. Apr 2023
  5. Nov 2022
    1. Now, I know people get concerned. They say, “Well, I might be injecting too much structure into my life and this is going to make my work life more rigid and I’ll be less creative.” I call nonsense on all of that. Just because you’re in control of everything doesn’t mean you need to schedule every seven minutes of your time like a crazy person.

      It is important to find the right granularity of your planning. Too small time block and you'll have an unrealistic plan, too large blocks and they don't help you prioritise.

  6. Jun 2022
  7. Jun 2021
  8. Mar 2021
    1. Stop thinking of the ideal user as some sort of honorable, frontier pilgrim; a first-class citizen who carries precedence over the lowly bot. Bots need to be granted the same permission as human users and it’s counter-productive to even think of them as separate users. Your blind human users with screen-readers need to behave as “robots” sometimes and your robots sending you English status alerts need to behave as humans sometimes.
  9. Feb 2021
  10. Dec 2020
    1. Managing cookies in your browserMost browsers allow you to control how cookies get used as you’re browsing.Some browsers automatically limit or delete cookies. Also, in some browsers, you can set up rules to manage cookies on a site-by-site basis, allowing you to permit cookies only from sites that you trust.In Google Chrome, the Settings contain an option to Clear Browsing Data. You can use this option to delete cookies and other browsing data. See our instructions for managing cookies in Chrome.Google Chrome also supports private browsing with its Incognito mode. You can browse in Incognito mode when you don’t want your site visits or downloads to remain in your browsing and download histories. Once you close all your Incognito browsing windows, Chrome won’t save your browsing history, cookies, and other data.Losing the information stored in cookies may make sites less functional but shouldn’t prevent them from working.
  11. Oct 2020
  12. Aug 2020
    1. Clausen, T. M., Sandoval, D. R., Spliid, C. B., Pihl, J., Painter, C. D., Thacker, B. E., Glass, C. A., Narayanan, A., Majowicz, S. A., Zhang, Y., Torres, J. L., Golden, G. J., Porell, R., Garretson, A. F., Laubach, L., Feldman, J., Yin, X., Pu, Y., Hauser, B., … Esko, J. D. (2020). SARS-CoV-2 Infection Depends on Cellular Heparan Sulfate and ACE2. BioRxiv, 2020.07.14.201616. https://doi.org/10.1101/2020.07.14.201616

  13. Jun 2020
  14. May 2020
    1. Internal platform groups (those focused on a non-user facing part of our product, like a set of internal APIs) tend to create heavy coordination costs on other groups which depend on platform improvements to deliver valuable features to users. In order to stay efficient, it is important to ensure each group is non-blocking and is able to deliver value to users directly. This is why we avoid internal platform groups.
    1. Blocking cookies before consent. In compliance with the general principles of privacy legislation, which prevent processing before consent, the cookie law does not allow the installation of cookies before obtaining user consent. In practice, this means that you may have to employ a form of script blocking prior to user consent.
    1. Implementing prior blocking and asynchronous re-activation Our prior blocking option prevents the installation of non-exempt cookies before user consent is obtained (as required by EU law) and asynchronously activates (without reloading the page) the scripts after the user consents.To use, you must first enable this feature: simply select the “Prior blocking and asynchronous re-activation” checkbox above before copy and pasting the code snippet into the HEAD as mentioned in the preceding paragraph.
  15. Apr 2020
    1. The user's computer stores and transmits cookies. Therefore, you as a user also have full control over the use of cookies. You can deactivate or restrict the transmission of cookies by changing the settings in your browser. Cookies that have already been saved can be erased at any time. This can also be done automatically. Please consult the documentation of your browser. Links to the cookie management documentations of some popular browsers:
  16. Mar 2020
    1. The fastest way to preventively block the scripts that require prior consent is to install a module on your own server that we have developed for Apache, IIS and NGNIX. After the initial configuration, the module will autonomously block all the resources that are subject to prior consent, on all sites on that server that are using the Cookie Solution.
    1. Is installing and configuring the plugin enough for compliance? Only if the only cookies your site uses are the Google Analytics ones. If other plugins set cookies, it is possible that you will need to write additional JavaScript.
    1. Cookies may not be detected by scanner if the related tag is triggered by actions such as form submission, scroll depth, timing delay, etc. These tags will need to be controlled by manual methods.

      With all these caveats listed, it makes me wonder for which tags auto-blocking does work. Only script tags inside of head?

      They are a bit vague in their "how it works" description...

  17. Dec 2019
  18. Nov 2019
  19. Oct 2017
    1. Whileblockingisoftengivenmoreattention,ofgreaterconcernishowsortingorganizesaccesstoknowledgeinmoreperniciousways.‘Googling’hasbecomearegularizedactionforfindingknowledgeinwaysthatareoftentakenforgrantedornotproblematizedbutsopervasiveanddominantthatthesearchenginehasgivenrisetotheterm‘googlization.’ThetermiscoinedtosuggestthatGoogleaffectseverything
    2. Cohenreferstoblockingas‘architecturesofcontrol’and‘regimesofauthorization’thatareauthoritarianinthegenericsensethattheyfavourcompliantobediencetoauthority.[11]Ratherthanexperiencingrules—whichneednotbeexplainedordisclosed—shearguesthatusersexperiencetheireffects,whichconsistofpossibilitiesforactionthatnetworkscreate.Sowhileconcernsaboutthesurveillanceandcollectionofdigitaltracesaremostcontroversial(discussedbelow),thetransparencyofnetworkprocessesandhowaccesstoknowledgeisbeingfilteredarelessvisibleandcontrollable.Filteringalsooccursthroughtheauthorizationsattachedtocontentanddevices

      [...] So while sharing is a calling, it is increasingly only within certain regimes of authorization that sharing operates, and in this regard it can be understood as a form of submission.

    Tags

    Annotators